Skip to content

Codingcryus/Internship-task1

Repository files navigation

Cyber Security Internship – Task 1 Report

Task Name: Scan Your Local Network for Open Ports
Objective: Discover open ports on devices in your local network to understand network exposure
Tools Used: Nmap, NSE, Wireshark


1. 📝 Introduction

Port scanning is a method used to identify open ports and services available on a networked device. It helps in understanding potential vulnerabilities in a system and is a foundational step in network reconnaissance for both defenders and attackers.


2. ⚙️ Environment Setup

  • Operating System: Windows 11 / Kali Linux / Ubuntu WSL

  • Nmap Version: 7.94

  • IP Range Used: 192.168.1.0/24

  • Local IP Address: 192.168.1.33


3. 🔍 Scanning Process

a. Command Used

nmap -sS 192.168.1.0/24

nmap --script=vuln 192.168.1.1

b. Explanation

  • -sS: TCP SYN scan (stealthy and fast)

  • 192.168.1.0/24: Scans all 256 IPs in the local subnet

  • --script=vuln: is an Nmap option that runs scripts to detect known vulnerabilities on a target system.


4. 📄 Results

  • Devices Found: 1 host is up.

    • 192.168.1.1
  • Open Ports:

PORT STATE SERVICE VERSION
21/tcp open ftp GNU Inetutils FTPd 1.4.1
53/tcp open domain dnsmasq 2.87
80/tcp open http Boa HTTPd 0.93.15
443/tcp open ssl/http Boa HTTPd 0.93.15
  • Screenshots:

image alt

image alt


5. 🔐 Security Analysis

  • Identify potentially risky open ports : 21 - FTP, 80 -HTTP , 443 - HTTPS
  • Identified Vulnerabilities (SEVERITY RISK Factor : HIGH)

image alt

image alt

image alt

image alt

  • Suggestions for securing these ports (e.g., close unused ports, use firewall)
Port Service Problem Solution
21 FTP FTP transmits credentials in cleartext. - Disable FTP if not in use.

- Replace with SFTP or FTPS for secure file transfer.

- Use strong access control and limit IPs allowed to connect.
22 SSH Port is filtered, might be intentionally firewalled. - Change default port from 22 to something higher (e.g., 2202).

- Use key-based authentication, disable password login.

- Enable fail2ban or rate-limiting to block brute-force attempts.
53 DNS DNS services can be misused for amplification attacks or poisoning. - Restrict DNS to internal IPs only.

- Disable recursion for external queries.

- Monitor DNS traffic for anomalies.
80 HTTP Vulnerabilities:

- Detected CSRF form (/boaform/admin/formLogin)

- XSS scan attempted, but no stored or DOM XSS found
- Redirect HTTP to HTTPS.

- Implement anti-CSRF tokens.

- Sanitize user inputs and use security headers (Content-Security-Policy, etc.).
443 HTTPS Vulnerabilities:

- Heartbleed (CVE-2014-0160)

- POODLE (CVE-2014-3566)

- CCS Injection (CVE-2014-0224)
- Upgrade OpenSSL to latest version (>=1.0.1h or newer).

- Disable SSLv3 and weak cipher suites (TLS_RSA_WITH_AES_128_CBC_SHA).

- Prefer TLS 1.2 or TLS 1.3 only.

- Reissue certificates if Heartbleed has been detected (possible key leak).

General Hardening Recommendations

  • Use a firewall (e.g., UFW, iptables) to allow only needed ports.

  • Run nmap scans regularly to detect changes.

  • Keep all services updated (especially SSL libraries).

  • Enable intrusion detection systems (IDS) like Snort or Suricata.

  • Document exposed services and regularly audit them.


6. 📘 Learnings

  • Gained hands-on experience using Nmap for port and vulnerability scanning.

  • Understood the role of port scanning in identifying exposed services.

  • Learned how attackers use scans to find weak points in a network.

  • Detected real-world vulnerabilities like Heartbleed, POODLE, and CSRF.

  • Learned how to analyze scan results and recommend security fixes.

  • Improved skills in documentation and basic network security.


About

Scan Your Local Network for Open Ports

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors